Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • AI & Machine Learning

Threat Protection & Clean Data Recovery with Cohesity

Cohesity
03/20/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Cyberattack dwell time has decreased to as little as one hour, but organizations take days or weeks to detect threats, creating a critical need to scan backup data for hidden malware that evades primary detection systems.
  • Cohesity's threat protection creates hashes of every backed-up file and compares them against threat intelligence from CISA, Cohesity Red Labs, and third-party feeds like CrowdStrike Falcon to identify compromised data before recovery.
  • The platform enables both proactive threat hunting (pre-attack) and incident response scanning (post-attack) to determine the blast radius of attacks and identify clean recovery points, reducing RTO and preventing reinfection.
  • Hash-based telemetry provides common indicators that can be correlated with production security tools (SIEM, EDR, network intelligence) to understand the full scope of an attack across both backup and production environments.

The Urgency of Threat Detection in Backup Data

This presentation addresses a critical gap in cyber resilience strategy: the need to scan and hunt for threats within backup data, not just production environments. Chris Hoff and Teresa Miller explain that modern cyberattacks have reduced dwell time to as little as one hour, while organizations often take days or weeks to detect and respond. The core challenge is that malware is designed to evade detection, evolve rapidly, and can remain hidden in backup snapshots for months. When organizations need to recover from an attack, they must ensure they're restoring clean data rather than reintroducing compromised files. Cohesity's approach combines malware scanning, anomaly detection, and threat hunting capabilities that work against backup data both proactively (pre-attack) and reactively (post-attack), providing organizations with the confidence that their recovery points are free from threats.

Integration with Threat Intelligence and Recovery Workflows

The platform creates a hash of every backed-up file and compares these hashes against known malicious file databases from sources like CISA and Cohesity Red Labs. Beyond internal threat intelligence, Cohesity integrates with third-party feeds including an out-of-the-box connection to CrowdStrike Falcon's threat intelligence. This integration enables early threat detection and helps determine the blast radius of an attack by tracking file propagation across snapshots. The hash-based approach provides common telemetry that can be correlated with production security tools like SIEM, EDR, and network threat intelligence platforms. By identifying which snapshots contain threats and which are clean, organizations can make informed decisions about recovery points, whether restoring directly to production or into a clean room for forensics. This visibility into backup data integrity directly reduces recovery time objectives and overall business downtime.

Chapters

0:00 - Introduction: The Speed of Modern Cyberattacks
1:09 - Enterprise Challenges: Why Scan Backup Data
3:17 - Pre-Attack: Proactive Threat Hunting
3:48 - Post-Attack: Incident Response & Clean Recovery
5:31 - Reducing RTO Through Threat Intelligence

Key Quotes

0:13 "... dwell time has been reduced to as little as one hour ..."
2:56 "... dwell time could be as little as an hour, but it could actually be that those attackers are sitting in your network for months, and then your backup data has been impacted, and you can't get back to a clean state without having done some level of work to clean that data ..."
4:39 "We create a hash of every file that we back up. And we can use that hash to compare it against known bad databases from leading vendors such as CISA or here at Cohesity Red Labs to determine whether or not a file is malicious."
5:01 "... we have an out-of-the-box integration with CrowdStrike Falcon's threat intelligence ..."

Categories:
  • » Webinar Library » Cohesity
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Threat Intelligence
  • Backup & Recovery
  • Technical Deep Dive
  • Security Operations
  • Backup Data Threat Scanning
  • Cyber Resilience
  • Malware Detection
  • Threat Intelligence Integration
  • Clean Data Recovery
  • Incident Response
  • Hash-Based File Analysis
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Threat Protection & Clean Data Recovery with Cohesity

              Upcoming Webinar Calendar

              • 03/26/2026
                01:00 AM
                03/26/2026
                Reclaim Network Clarity and Accountability with Netskope DEM
                https://www.truthinit.com/index.php/channel/1846/reclaim-network-clarity-and-accountability-with-netskope-dem/
              • 03/26/2026
                05:00 AM
                03/26/2026
                ITDR's Role in Strengthening Critical Security Architecture
                https://www.truthinit.com/index.php/channel/1863/itdrs-role-in-strengthening-critical-security-architecture/
              • 03/26/2026
                01:00 PM
                03/26/2026
                HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience
                https://www.truthinit.com/index.php/channel/1835/human-dialogue-transforming-municipal-risk-through-ai-and-city-scale-cyber-resilience/
              • 03/26/2026
                01:00 PM
                03/26/2026
                Making GPUs Available On Demand (Without Breaking the Budget)
                https://www.truthinit.com/index.php/channel/1858/making-gpus-available-on-demand-without-breaking-the-budget/
              • 04/08/2026
                01:00 PM
                04/08/2026
                Managing Configuration at Scale Across Group Policy and Intune
                https://www.truthinit.com/index.php/channel/1865/managing-configuration-at-scale-across-group-policy-and-intune/
              • 04/15/2026
                01:00 PM
                04/15/2026
                Service Account Security in the Age of AI: From Legacy Accounts to Agentic Identities
                https://www.truthinit.com/index.php/channel/1866/service-account-security-in-the-age-of-ai-from-legacy-accounts-to-agentic-identities/
              • 04/30/2026
                10:00 AM
                04/30/2026
                SaaS Data Protection Insights: Key Findings from the 2026 Keepit Annual Report
                https://www.truthinit.com/index.php/channel/1868/saas-data-protection-insights-key-findings-from-the-2026-keepit-annual-report/

              Upcoming Events

              • Mar
                26

                Reclaim Network Clarity and Accountability with Netskope DEM

                03/26/202601:00 AM ET
                • Mar
                  26

                  ITDR's Role in Strengthening Critical Security Architecture

                  03/26/202605:00 AM ET
                  • Mar
                    26

                    HUMAN Dialogue: Transforming Municipal Risk through AI and City-Scale Cyber Resilience

                    03/26/202601:00 PM ET
                    • Mar
                      26

                      Making GPUs Available On Demand (Without Breaking the Budget)

                      03/26/202601:00 PM ET
                      • Apr
                        08

                        Managing Configuration at Scale Across Group Policy and Intune

                        04/08/202601:00 PM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version